News Archive

Product Report

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM is defined as a suite by the vendor. However, it is more sort of an integrated product with several common elements and different feature sets, going beyond the typical suite approach. Cyber-Ark itself names the common elements as “Privileged Identity Management Infrastructure”. Defining the...

Product Report

Product Report: Zscaler Cloud Security

Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention. What makes Zscaler stand out their competitors in SaaS security market is that their solution is entirely cloud-based and does not require any extra hardware or software installation. By utilizing a large global network with more than 40 datacenters around the world and optimized and hardened network architecture Zscaler is capable of providing high...

Webcast

Using Standards to Manage Access to SOA and Cloud Services

Kuppinger Cole Webinar recording

Blog

Lessons enterprises should learn from the recent wiki-leak

There has been a lot of discussion around Wikileaks publishing an incredible amount of data which has been classified as confidential by the US Government. I don't want to discuss this from specifically - many people have done this before, with fundamentally different conclusions. More interesting is what this means for private organizations, especially enterprises. Wikileaks has threatened some of them: The russian oligopolies, the finance industry in general. That comes to no surprise. Wikileaks founder Assange rates them as "bad",e.g. his enemies. Given that Wikileaks isn't alone out...

Webinar

Jan 26, 2011: The Business Value of Log Management Best Practices

Although log management recently has been gaining more attention as a key element of any information security strategy, many even large organizations have not yet developed and implemented log management best practices. In this webinar, Kuppinger Cole´s Pricipal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices.

Webcast

Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps

Kuppinger Cole Webinar recording

Blog

Cloud Computing – Service Integration Smarts for CIOs

Cloud Computing is the hot topic in IT and it will remain so, though possibly not under the same name. And while the hype expression may change, Cloud Computing itself is going to fundamentally redefine business IT. And while not every CIO may welcome this development, he or she should prepare themselves for what is clearly going to be the next big step in this industry. Cloud Computing stands for services made available and consumed via „clouds", be they private or public. The term cloud itself simply indicates an IT environment in which such services are hosted. Having said...

Webcast

Building Operational Governance for SharePoint 2010

Kuppinger Cole Webinar recording

Blog

Creating new attack surfaces in VMs and Network Security devices

There is a good reason to add functionality to specific types of devices, especially in the network. Doing security at the edge can be highly efficient. Thus, implementing for example PEPs (Policy Enforcement Points) for access management into network access gateways is, from the perspective of efficiency, a pretty good idea. And when looking at what the network vendors like Cisco, F5 Networks, and all the others are doing, the number of add-ons which can be added to these devices and run locally has increased significantly. Basically the same, still at a lower level, could be observed...

Blog

EU Privacy Direction

Last week I had the privilege of attending a seminar at which Peter Hustinx, the EU Privacy Commissioner outlined the future approach on personal data protection in the European Union.   This approach includes “a right to be forgotten” as well as mandatory data breach reporting.   Given that the WikiLeaks website has recently released 2.5 million documents that were supposedly “private” reports by US embassies - you might ask “what does privacy mean?”  Well privacy in this context is more narrowly defined to be privacy of personal information. In the EU privacy is based on the European...

Blog

Without standards for DRM and IRM Cloud Security will remain a daydream

IT Security in and for the Cloud is one of today’s hottest topics. Unfortunately, it is almost as complicated as the Cloud itself, spanning from Identity Management and logging intelligence to data encryption. This article explores the various scenarios and demonstrates both strengths and weaknesses. Vendors both like to invent and employ hype expressions to describe their technologies, and it is clear why: They want to make their products stand out from the rest. It's been that way since the earliest days of modern computing, and it goes especially for the field of IT Security. Remember...

Vendor Report

Vendor Report: Novell - Identity and Security

Novell has a long history in the fields of identity and security. The company was one of the pioneers in network operating systems and the corresponding directory and security services. Over the year, it has continued to develop and expand its portfolio. Today, identity and security remain at the heart of Novell’s business model, along with products for data centers based on Novell Suse Linux as well as products for communication, security and device management collectively labeled “end user computing”. Over the past years, Novell has been following a clearly fined...

Webcast

How Does Cloud Governance Relate to IT and SOA Governance and What Should Be Done Differently?

Kuppinger Cole Webinar recording

Webcast

Designing a Cloud-ready Holistic IT Security Concept - the Business View

Kuppinger Cole Webinar recording

Webcast

Cloud Computing Risk Areas

Kuppinger Cole Webinar recording

Webcast

5 Key Challenges for Cloud Computing Governance

Kuppinger Cole Webinar recording

Webcast

Privileged Cloud Identity Management

Kuppinger Cole Webinar recording

Blog

Waking up to the walk-away problem

Okay, just because I’m paranoid doesn’t mean they aren’t out to get me, right? But I guess that’s what comes from dealing to long with IT security people whose chosen profession involves trying to outsmart some very smart people on the dark side of computing. I love listening to my friend Andy Müller-Maguhn, for instance. He's one of the founders of the Chaos Computer Club in Hamburg, who likes to scare the heck out of managers in the audience by describing the ingenious ways hackers have for breaking into other people’s systems and what all the horrible damage they can do there. Andy is...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]